On the Security of two Authenticated Encryption Schemes.
Jianhong ZhangCheng JiPublished in: ICNSC (2008)
Keyphrases
- encryption scheme
- diffie hellman
- key exchange
- key exchange protocol
- key agreement protocol
- security analysis
- cca secure
- standard model
- security model
- public key encryption
- secret key
- public key
- hash functions
- public key cryptosystem
- data sharing
- ciphertext
- authentication scheme
- secret sharing scheme
- homomorphic encryption
- encryption key
- encryption algorithm
- proxy re encryption
- lossless compression
- signcryption scheme
- private key
- key distribution
- databases
- security requirements
- identity based encryption
- outsourced databases
- data management